【Protect yourself on the Internet】

Recently, the news that a college graduate stole the school’s intranet data and collected the personal privacy information of all students in the school has aroused people’s renewed attention to the issue of personal information security in Internet life. In the era of big data, algorithm distribution has brought privacy violations. While enjoying convenient rights such as consumer life, it seems that there are many concerns about personal information leakage. Trade privacy for convenience or spend money to protect privacy?

1. Internet Survival Guide: What methods are used to strengthen the protection of personal information?

On social platforms, you can set the default person to prohibit access to the homepage, or prohibit strangers from viewing information to prevent your own information from being used by criminals, or set different permissions to limit the permissions of each application to achieve protection. Purpose of own information.
Try to release real personal information as little as possible on social platforms, and face the roadside scanning code to receive small gifts or pay attention to receive gifts, etc., you need to try to avoid operating this kind of behavior. Information leakage brings greater hidden dangers.

2. How should the relationship between personal information protection and the development of the digital economy be balanced?

In the Internet age, classify the applications you just need, give them normal use permissions, and lock the infrequently used application permissions. When you check the privacy service, you can find out what kind of terms you have signed. . The development of the digital economy must bring about the generalization of personal information. Through the construction of user images of various software, it may be possible to construct an image that understands oneself better than real people. By considering whether the use of information exchange brings benefits or disadvantages, and then make a choice after consideration, instead of using one's own information to exchange only seeing meager benefits.

3. How do Internet companies handle data privacy?

Internet companies should actively protect users' personal information, instead of using personal information to build a user image and monopolize it. They should save user information in the most secure database, so as not to leak a large amount of user personal information when attacked .

4. How to strengthen education and awareness of personal privacy?

Knowledge should be popularized among student groups, and lectures should be given to make students aware of the hidden dangers brought about by the leakage of personal information.
The media should also play a leading role in reporting on the protection of personal privacy, and warn every user to protect their own rights by publicizing the market fluctuations that will be caused by the use of personal information by large companies.
For in-depth observation of applications and services that need to use personal information, whether this application requires so many permissions to be able to use.

Guess you like

Origin blog.csdn.net/m0_64384233/article/details/131684688